Existing commercial database systems provide spatial libraries that support functions on static non-moving spatial objects, e.g., points, linestrings and polygons. Examples of these spatial functions include intersect...
详细信息
Effective recommendation systems are essential for supporting decision-making in various fields in this age of abundant information. This paper presents a novel framework for a Modified Recommender Algorithm that comb...
详细信息
We develop two novel techniques, FHMT and HWMT, for streaming authenticated data structures to achieve the streaming verifiable computation. By leveraging the computing capability of fully homomorphic encryption, FHMT...
详细信息
ISBN:
(纸本)9781450338325
We develop two novel techniques, FHMT and HWMT, for streaming authenticated data structures to achieve the streaming verifiable computation. By leveraging the computing capability of fully homomorphic encryption, FHMT shifts almost all of the computation tasks to the server, reaching nearly no overhead for the client. HWMT strikes the performance balance between the client and server via the proposed tree decomposition technique over the Merkle tree. We also report our research attempt, SAMT, to construct a more efficient data structure for extremely resource-limited clients without the heavy computation burden on the server.
Firewalls play a critical role in controlling incoming and outgoing community site visitors and shielding a wireless network from malicious assaults. This technical summary focuses on the development of firewalls as a...
详细信息
Finding persistent and inactive activity periods is very helpful in practice, for example to detect intrusion activities. Most of the literature focuses on finding persistent flows or frequent flows. No previous work ...
详细信息
Physical agents (such as wheeled vehicles, UAVs, hovercraft, etc.) with simple control systems are often sensitive to changes in their physical design and control parameters. As such, it is crucial to evaluate the age...
详细信息
Information mining and synthetic intelligence (AI) have gained a lot interest in recent years in the discipline of large-scale statistics processing. AI-driven statistics mining strategies are especially effective for...
详细信息
comfy Shell (SSH) is an effective community protocol used to securely connect devices over a computer community. It gives information encryption for relaxed conversation among clients and servers, and can be used to g...
详细信息
In the treasure hunting process, the hunters could only get few hints with simple words, therefore they must think over with the experience they learned before. The goal of this paper is to propose a treasure hunting ...
详细信息
In this paper, we consider multi-view video and audio streaming using MPEG-DASH, which enables to transmit video tailored to the network conditions over HTTP communication. This paper uses HTTP/2 instead of HTTP/1.1, ...
详细信息
暂无评论